HL7 Mobile Health Application Functional Framework; Consumer mhaFF, Release 1 (pi id: 1182)



Download 180.52 Kb.
Page6/7
Date21.06.2017
Size180.52 Kb.
#21292
1   2   3   4   5   6   7

Use App


The functionality of an app, its sponsorship, and linkages to external data sources all affect the security, privacy and data controls which are established to ensure safe and effective use. In this section, conformance criteria point to issues which can be addressed through a range of options, and as such implementers should consider not only the conformance criteria but the discussion regarding applicability to the exemplary use cases.


3.1 User Authentication and Authorization to Access App Services

1

SHALL

The identity of an app user is authenticated prior to any access of PHI or PII. The method of authentication is communicated to the app user when an app account is established.




SHALL [IF]?

[EHR is a system actor] IDENTITY PROOFING CRITERIA TO BE ADDED. Need to ensure that the remote access is legitimately from the real account holder. At app registration time, the API Provider may need assurance of the identity of the app developer; at app approval time the API provider needs assurance of the consumer’s identity and the patient may need assurance of the app’s authenticity; at data access time, the API provider may need assurance of the app’s authenticity in order to permit access.

2

SHALL

The app user is authorized to access a feature of the app before that feature or any associated PHI or PII is displayed. Authorization may be internal to the app or derived from an external source.

3

SHALL [IF]

[EHR is a system actor]8 The EHR authorizes an app user’s access to app features when these features are supported by data provided by or written to the EHR.

4

SHALL

At the request of an app user, the app terminates such that access to PHI or PII requires a new, successful authentication attempt.

5

SHALL

The app terminates access to PHI or PII after a period of time of disuse as described in the app’s Terms of Use. The determination to include this feature within an app is made as part of the overall risk analysis regarding the sensitivity of data provided by or though the app.










Related regulations, standards, and implementation tools

National Institute for Standards and Technology (NIST), Cybersecurity Framework, http://www.nist.gov/cyberframework/



Implementation guidance

See Section 2.2 for a discussion as to the selection and ongoing use of a user authentication mechanism.



NIST: Measuring Strength of Identity Proofing, December 16, 2015, https://www.nist.gov/sites/default/files/nstic-strength-identity-proofing-discussion-draft.pdf
API Task Force Final Report, May 12, 2016: https://www.healthit.gov/facas/sites/faca/files/HITJC_APITF_Recommendations.pdf



3.2 User Authorizations for Data Collection and Use

1

SHALL

Smartphone functionality and data sources may only be used when it is essential to the functioning of the app. This includes the use of: location services, camera, microphone, accelerometer, contact lists, calendars.

2

SHALL

Before using select smartphone functions and data sources for the first time, app users are asked for permission to use these services and data sources. Permissions for each function, data source and user tracking activity controlled by the app are asked as individual questions while the app user is interacting with the app. This includes the use of: location services, camera, microphone, contact lists, activity tracking, calendars, and other available sensors.

3

SHALL

Before exporting data from the smartphone, or from any device integrated with the smartphone, the app user is asked for permission to transmit the data with an explanation of what data is being transmitted. Permission is requested before the first potential transmission of data. Permission is re-requested the first time any additional data elements are sent to an external data source when permission had previously been extended for a smaller set of data. Permission is not requested at every transmission, if the scope of exported data remains unchanged.

4

SHOULD

An app user can choose to permit some, but not all, requested data to be exported from a smartphone or associated device. The user is informed as to how the choice to limit data effects the functionality of the app.

5

SHOULD

[app user denies a permission requested by the app] The app user is informed of the consequence of not extending the permission and is given a second chance to extend a permission.

6

SHALL [IF]

[app requests permission to use data generated by the app after it is de-identified] Account holder is informed of who would have access to the de-identified data and for what purpose.

7

SHALL [IF]

[app requests permission to use data generated by the app after it is de-identified] Account holder is informed of the possibility that de-identified data can potentially be re-identified and steps the app sponsor takes to prevent re-identification.

8

SHALL [IF]

[user gives permission for data generated by the app to be de-identified and used] Data de-identification, at minimum, follows HIPAA safe-harbor rules.

9

SHALL [IF]

[in-app payments exist]. In-app payments are not triggered in such a way that can expose healthcare-related information to payment organizations.

10

SHALL [IF]

[app uses in-app advertising]. Potential use of PHI or PII to personalize advertisements from the app shall be disclosed to the user, who shall be given the opportunity to consent or decline.

Related regulations, standards, and implementation tools
ONC Model Privacy Notice (updated December, 2016) https://www.healthit.gov/sites/default/files/2016_model_privacy_notice.pdf

Cross-Device Tracking Considerations https://www.ftc.gov/system/files/documents/public_events/630761/cross-device_tracking_workshop_deck.pptx




Implementation guidance




3.3 Pairing User Accounts with Devices and Data Repositories

1

SHALL

User has authenticated identity to an app and has an active session before pairing an external device to an app account.

2

SHALL

Before a device is paired with an app to collect information about a specific individual, , the app displays a screen which asks the user to confirm that the device will collect information about a specific, named person. The person may be the account holder or a proxy subject of the account holder.

3

SHALL

The person who pairs a device with an individual in context of use of a specific app can un-pair the device and individual through an app utility.

4

SHALL

Before a device is paired with an app to collect information about a specific individual, , the app states what data will be collected by the device and how the device data is used. This statement may include a link to an informational page which provides details about data collection and use.

5

SHALL [IF]

[Data for more than one person can be collected by the app/device pair] The app asks the account holder to confirm the person for whom data will be collected by the device before data is collected and transmitted.

Related regulations, standards, and implementation tools


Implementation guidance




3.4 Security for Data at Rest

1

SHALL

PHI and PII stored on a smartphone is stored as encrypted values.

2

SHALL

PHI and PII stored by the mobile app on any external server is stored as encrypted values

3

SHALL

Unless PHI and PII has been transmitted to a data set maintained by a Health Plan or Health Provider, the account holder can delete information collected through the app, including data generated by a device associated with the app.

Related regulations, standards, and implementation tools


Implementation guidance

Encryption paradigms should follow contemporary practices as the strength of an encryption method may degrade over time as computational methods for breaking encryption continue to evolve.





3.5 Security for Data in Transit

1

SHALL

PHI and PII transmitted between an app and an external data source, including data generated through a device associated with the app, are transmitted as encrypted values.

Related regulations, standards, and implementation tools


Implementation guidance



3.6 Data Authenticity, Provenance and Associated Metadata

1

SHALL

Apps conform to Best Practices for Data Authenticity, Provenance, and Associated Metadata

2

SHALL

[IF}


[App itself originates data ] Customer has review option which includes the option to irreversibly destroy, reject or discard data.

3

SHALL

[IF}


[App itself only receives data as a “pass through” and cannot store data] Customer has a review option to display the data prior to executing the pass-through which includes the option to irreversibly stop and block the pass-through.

4

SHOULD

[IF]


[App itself receives data and stores it] Customer has a review option that permits only appending data and/or free text comments to received data as author while preserving the original received data intact with original provenance. User may comment that data are erroneous, but does have the option to delete the original data.

Related regulations, standards, and implementation tools

Cornell University has federal rules of evidence [need specific reference]

Implementation guidance

[THIS FOLLOWING DISCUSSION IS NOT A PART OF THE EVOLVING STANDARD BUT A GLIMPSE OF THE INTERNAL DISCUSSION THAT THE TEAM HAD – THIS WILL BE DELETED IN THE FINAL VERSION]

As permitted by the Account Holder and supported by the app, someone other than the Account Holder is able to access the system
[App generates data to a persistent record for ongoing clinical decision making]
Capturing different specifications for what constitutes data authenticity and provenance and necessary supportive metadata. Some Realms have definite concepts on what constitutes reliability. At the minimum, specifications should support US Realm Business Records requirements according to the Federal Rules of Evidence. [can be distilled to 15-20 lines of prose].
Digital signature standards exist—seems like digital sigs. Human validation could sub
Record reviews “tripped” when there is NOT external validation.
If information from an app is not otherwise validated by a trusted agency, a trust protocol must be part of the device validation. [add sources].
Persistent records + NOT from a device with validation, THEN . . .
Reviewer#1: We would best revisit the topic of what to call the class of activities we're outlining for supporting data quality, etc., I think validation may actually stand up. Attestation being one type of validation.
Verify assumes specifications to verify against. Verify has no or limited meeting without knowing the verification criteria and what the object is verified against. Could be sufficient to say one or more specification types may apply. “verification” includes a number of concepts. In paper world, was impossible to segregate in any meaningful way, terms such as “verify” “attest” “certify” are used in a free form way. Is this idea not yet ready, but may have arrived in the circumstance of a relatively small subcategory of consumer mobile apps where info is intended for end use with specifications (e.g., clinical decision support), research design parameters are specified. E.g. in MU1, clinicians required to ATTEST to facts, but not to VERIFY (i.e., good faith effort vs true facts).Still, some went ahead and verified information accuracy. ***all data is not “equal” in terms of its value and need for precision***
Reviewer#2: Verify and validate are concepts we currently work with. What is the action verb to determine data was not accurate.

Reviewer#1: not deeply researched this, but people working on these issue say that “verification” could reasonably considered a more specific term under “validation”. Some validation schema attempt to capture truthfulness, accuracy and then ask for proof in a referenced way.

Another term in lifecycle events is “attest”. Attestation does not imply that any rigorous evaluation has occurred. There is a fuzzy notion that I attest based on who I am, not the quality of the data (qualified to make a good-faith statement). “to the best of my knowledge”

Reviewer#2: testing/validating data—look to VW and recent issues.


Reviewer#3: this aligns with chain-of-evidence. Mistakes amplify.
Reviewer#1: one of the problems is that in the current marketplace, can’t say who does this well and who does not.


3.7 In-app Payments



3.8 Notifications and Alerts

1

SHALL

Opt-in consent is required by the account holder before receiving notifications and alerts from an app.

2

SHALL

To consent to receiving a notification or alert from an app, the account holder is informed of both the content and channel (SMS, push notification, email, etc.) of the notification or alert.

3

SHALL

An account holder can change consent decisions about notifications and alerts through settings available on the device on which the app was downloaded.

4

SHALL

As permitted by the account holder, notifications and alerts may be sent to the account holder or to another person or entity.

5

SHALL

Notifications and alerts contain the least amount of information necessary for the recipient of the alert to take a focused action.

Related regulations, standards, and implementation tools


Implementation guidance




3.9 Product Upgrades

1

SHALL

The app respects operating system level permissions concerning automatic product updates.

2

SHALL [IF]

[an updated version of the app includes updated terms of use] Updated Terms of Use are presented to the account holder for acceptance before an updated version of an app may be used. Significant changes to terms and conditions are highlighted, and a link to the full set of updated Terms of Use is available.

3

SHALL [IF]

[automatic app updates are not enabled] The app prompts the user to the availability of a new version of the app when a new version is available.

4

SHALL [IF]

[account holder elects to not install a new version of an app] The consequences of not installing the new version of the app, including information about support limitations for the older version of the app, are presented to the account holder.

Related regulations, standards, and implementation tools


Implementation guidance




3.11 Audit

1

SHALL

[IF]


[User authentication is required to access app] User authentication attempts, both successful and unsuccessful, generate an audit record.

2

SHALL

User permissions to access, or the revocation of access, regarding smartphone/tablet device capabilities for use by the app (e.g., use of camera, location services) generate an audit record.

3

SHALL

[IF]


[App uses external devices or data sources for data collection] Pairing a device or data repository external to the app, which supplies data used by the app, generates an audit record.

4

SHALL

[IF]


[App allows for the export of data to a data repository external to the app] Any export of data from the app generates an audit record.



















Related regulations, standards, and implementation tools


Implementation guidance

Every consumer mobile health app needs an audit strategy, which includes what data will be generated for audit, who will be able to access audit records, the location where audit data is stored, the length of time audit information will be stored, and any ability to delete audit data. Audit for security events is highly dependent on the nature of the app itself; audit requirements will differ significantly based on app sponsorship (e.g., sponsor is a HIPAA entity or a commercial non-covered entity), the need for user authentication, and if data generated through an app is accessible by consumers, clinicians, or both.


Health apps may be used indefinitely or for a finite period of time. Disuse may happen when a health condition improves, a new health habit is established, when motivation to use the app wanes, or when the user determines a different app better meets their needs. Procedures for how data continues to be retained and used after account closure must be clear and understandable and give the app user options for relocation of their data to a new data repository.App Service Termination




4.1 App and Data Removal

1

SHALL

An app Account Holder can remove an app from a smartphone at any time.

3

SHALL

An app Account Holder is informed of the consequences of removing the app (e.g., loss of locally-stored data) from a smartphone and given an opportunity to confirm the removal of the app before the app is removed.

4

SHALL

An app Account Holder can close an associated account or data store associated with the app.

5

SHALL

An app Account Holder is informed of the consequences of deleting the account and is given an opportunity to confirm closing the account before it is closed.

6

SHALL

After deleting an account associated with an app, the Account Holder is informed of what data associated with the account persists, and the Account Holder’s rights in terms of access and deletion of that data. The user should be informed that data that was part of the account may have been transmitted to other systems, outside of the account itself, and may persist. For example, suppose the user collects device data in an app, and transmits that data to an EHR which stores it as PGHD. Deleting the account will not delete the data that is now in the EHR.

7

SHOULD

Before closing an app account, the account holder can download data generated by the account holder or a proxy subject of the account holder to a data set under the full control of the account holder (data portability).

8

SHALL [IF]

[the device permits remote or external access to device data] Any PHI or PII stored on a device can be wiped remotely by the account holder without deleting the account which is related to the wiped data.

Related regulations, standards, and implementation tools


Implementation guidance




4.2 Permitted Uses of Data Post Account Closure

1

SHALL

Data associated with an app account is not released to any new persons or entities. This includes data which has been de-identified.

Related regulations, standards, and implementation tools


Implementation guidance






Download 180.52 Kb.

Share with your friends:
1   2   3   4   5   6   7




The database is protected by copyright ©ininet.org 2024
send message

    Main page